Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Cloud Security Journal
A virtualized data center must be supported by a virtualized security system, which must be validated by a virtualized test systems and test methodologies. The rapid rise of cloud computing has delivered cost and productivity benefits to thousands of organizations as over 200 cloud pr...
To help Canadian firms develop new ventures in the Cloud computing market and contribute to making the nation a leader in this huge IT field, our Canada Cloud business plan will offer a Global Connect Program for fast-tracking the international expansion of the innovation it generates....
Raj Samani has been appointed as the Cloud Security Alliance (CSA) EMEA Strategy Advisor. The role is a non-compensated role that is intended to advise the CSA on best practices and a roadmap within EMEA, as well as support existing and developing CSA Chapters where appropriate within ...
“Privacy, authentication and trust are critical to Cloud computing,” noted Olivier Guilbert, CEO of OpenTrust. OpenTrust announced on Tuesday the OpenTrust Suite for Cloud, a full-featured offering of pay-as-you-go products and services designed to help customers make the most of the e...
Quest Software on Wednesday announced the release of Quest Cloud Automation Platform 7.5, the next generation of enterprise-class cloud automation and management technology. Featuring patented technology, the platform enables organizations to efficiently manage and deliver complex IT s...
Gain confidence in the cloud. You can’t wait to reap the full benefits of virtualization and cloud computing. But hold on. In a new white paper, ESG Research warns you to prepare now so you won’t be sorry later. Find out what you need to do to vaporize your risks as you take to the sky...
In the run-up to the next Cloud Expo, 7th Cloud Expo (November 1-4, 2010) at the Santa Clara Convention Center in Silicon Valley, it's time to give my earlier list a complete overhaul. Here, accordingly, is an expanded list of the most active players in the Cloud Ecosystem.
SYS-CON Events announced today that Layer 7 Technologies, a provider of security and governance for SOA and cloud solutions, will exhibit at SYS-CON's 7th International Cloud Expo, which will take place on November 1–4, 2010, at the Santa Clara Convention Center in Santa Clara, CA. La...
As much as information technology has changed in the last 10 years, the next decade promises even more significant change. As cloud technology becomes more prevalent, IT enterprises will be driven to reconsider the status quo around just about everything we know, and ask "what if?" whe...
There is a lot of hype around cloud computing. And there are many myths about cloud security. But is cloud computing really a risk? Interestingly, many of the potential security issues in cloud computing are overhyped – and others are vastly ignored. Cloud computing is not only hype. ...
Sentrigo, Inc. on Tuesday announced that it has joined the Cloud Security Alliance (CSA) as a corporate sponsor to help develop best practices for protecting sensitive data and achieving compliance in cloud computing deployments. Sentrigo will work with the Cloud Security Alliance to...
Malicious software or malware is a security nightmare. One can agree with a statement that malware in the internet is a growing epidemic and is costing industry billions of dollars each year. According to Microsoft malware “is short for malicious software and is typically used as a...
Everybody’s up in the air about clouds, but few seem to really know where they’re heading. Most existing applications aren’t ready for the cloud quite yet, especially since the realization seems to be sinking in that building security into the cloud is no trivial pursuit. Cloud comput...
Freedom OSS on Tuesday announced the availability of its vNOC 2.0 offering. As part of the company’s 'Stairway to the Cloud'™ suite, vNOC 2.0 eases the transition to cloud services for enterprise organizations by mitigating risks and reducing costs. vNOC 2.0 features include: encryptio...
TwinStrata on Monday announced that it is jointly delivering a highly efficient, cost-effective solution for the creation and storage of VMware backups with Veeam Software. TwinStrata’s CloudArray software, when used in conjunction with Veeam Backup & Replication, gives organizations e...
Cloud computing and social media are increasingly popular with small and medium-sized businesses and the SMB segment is of increasing importance to solution vendors and service providers. But, the silver cloud has a dark lining - security. SMB users are largely defenseless and unawar...
The massive transformation of IT, driven by virtualization and cloud computing initiatives, is compelling a rethink of the way enterprises protect their critical assets. The most critical resources are typically the applications and their data, plus their supporting systems, i.e., serv...
Cloud computing is profoundly changing the way we think about IT and the enterprise. As we know cloud computing is a must have – will your enterprise use a public, private or hybrid approach? Gartner forecasts that by 2012, industrialized utility and cloud-based services will account f...
What is involved in transitioning into and operating within a cloud environment? Key areas include considerations surrounding planning and execution; impact to skill-sets, cultural, policy changes, and governance; and views from the business, end user and infrastructure In their sess...
As much as information technology has changed in the last 10 years, the next decade promises even more significant change. And as cloud technology becomes more prevalent, IT enterprises will be driven to reconsider the status quo around just about everything we know, including Physical...
CA is buying Arcot Systems, the privately held subscription-based on-premises and cloud authentication and fraud prevention ISV, for $200 million cash. Its software and 165 employees are bound for CA’s Identity and Access Management (IAM) unit to be combined with CA’s SiteMinder port...
Public cloud adoption by an enterprise may have numerous barriers and challenges surrounding data privacy, residency, and security. Transitioning from on-premise solutions to the cloud means ceding data governance to the cloud vendor. This may impact your enterprise regulatory complian...
How can organizations leverage the cloud to save costs and increase security today? What do they need to be thinking about and doing to plan for the future? In his session at the 7th International Cloud Expo, Scott Chasin, CTO McAfee Content & Cloud, will discuss how the cloud is chan...
HyTrust, Inc., a provider of access control and policy enforcement for virtualization infrastructure, on Monday announced HyTrust Cloud Control and out-of-the-box integration between HyTrust Appliance and VMware vCloud Director. The solution brings strong authentication, role-based acc...
Security is a prime impediment to cloud adoption, right? Right. Well, Centrify has this idea: Suppose it turns any company’s venture into the cloud into a lock-box – sealed off from the nasties – if anything dastardly happens the user has only its own staff to blame. That way compan...
ScaleUp, one of the first cloud providers, is now offering consulting to clients worldwide. They bring nearly 20 years of experience in large-scale Internet and Enterprise computing projects. ScaleUp’s specialty is on "secure cloud architecture" - making sure all the moving parts are s...
Verizon Business says its Computing as a Service (CaaS), which includes on-demand server, network and storage capacity, has passed a Payment Card Industry (PCI) Data Security Standard (PCI DSS) compliance audit for storing, processing and transmitting credit card information. That re...
One of the greatest moments a cloud evangelist indulges in occurs at that point a listener experiences an intuitive leap of understanding following your explanation of cloud computing. No greater joy and intrinsic sense of accomplishment.
Almost every survey about cloud puts "security concerns" at the top of the list. Real or perceived, security concerns in the cloud are causing serious grief for IT and security professionals. In his session at the 7th International Cloud Expo, Scott C. Sanchez, CISSP is Security and ...
SugarSync Inc., makers of SugarSync file sync, backup and sharing service, on Thursday announced that Internet security service company Webroot is leveraging SugarSync as its “behind the scenes” strategic partner powering the new cloud sync service featured in Webroot Internet Security...
The Cloud Security Alliance on Wednesday unveiled the industry’s first user certification program for secure cloud computing. The Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range of professionals with a responsibility related to cloud computing ha...
Lockheed Martin on Wednesday announced it has joined the Cloud Security Alliance (CSA) as a corporate member and the first systems integrator to promote the use of best practices for providing security assurance within cloud computing. Lockheed Martin will support the Cloud Security Al...
Cloud computing is an emerging phenomenon that offers enormous advantages, such as shorter time to market, flexible computing capabilities and limitless power, but the cloud market, still in a very early stage, continues to grow and evolve. As cloud computing evolves, it creates a glo...
Cranium Solutions, Inc, the creator of ASAP (Automated Security Assessment Program) and a provider of end-to-end automated Security Assessment solutions, on Thursday announced the release of its cloud-based Vulnerability Assessment and Penetration Test services to GoGrid customers, bas...
CSC on Thursday announced availability of CSC CloudProtection for Mail and Web, a new cloud solution that delivers total enterprise network protection for clients’ e-mail and Web systems. For businesses and government organizations that want to operate confidently and securely in e-mai...
Unisys-hosted solutions give ClearPath clients new, cost-efficient options to source IT infrastructure for application development and modernization. Unisys Corporation on Thursday introduced the first in a planned series of managed cloud solutions for its ClearPath family of mainfram...
Most people cite security as their primary concern about adopting cloud computing. But most don't realize that cloud computing will actually improve their organization's computing security. In his session at the 7th International Cloud Expo, Bernard Golden, CEO of HyperStratus, will ...
NC4 Inc., a provider of Situational Readiness solutions, announced on Friday the Universal Console(UC) - a foundation technology that enables users of NC4's Homeland Security Cloud universal GIS access. Previously vast amounts of all-hazards mapping and GIS data has been accessible via...
Panda Security, The Cloud Security Company, has launched version 5.04.50 of Panda Cloud Office Protection, its cloud-based security solution for business endpoints. This new version includes several new features and improvements providing small and medium sized businesses as well as th...
Solutionary, cloud security provider, on Monday announced that it has joined the Cloud Security Alliance (CSA) to help support the growth of cloud computing. Solutionary is participating as a featured speaker at two upcoming cloud industry events: The Cloud Security Alliance at Black H...